175-200 Flashcards
A Chief Information Security Officer has defined resiliency requirements for a new data center architecture. The requirements are as follows:
* Critical fileshares will remain accessible during and after a natural disaster.
* Five percent of hard disks can fail at any given time without impacting the data.
* Systems will be forced to shut down gracefully when battery levels are below 20%.
Which of the following are required to BEST meet these objectives? (Choose three.)
A. Fiber switching
B. IaC
C. NAS
D. RAID
E. UPS
F. Redundant power supplies
G. Geographic dispersal
H. Snapshots
I. Load balancing
D. RAID
E. UPS
G. Geographic dispersal
Which of the following is a security best practice that ensures the integrity of aggregated log files within a SIEM?
A. Set up hashing on the source log file servers that complies with local regulatory requirements.
B. Back up the aggregated log files at least two times a day or as stated by local regulatory requirements.
C. Write protect the aggregated log files and move them to an isolated server with limited access.
D. Back up the source log files and archive them for at least six years or in accordance with local regulatory requirements.
A. Set up hashing on the source log file servers that complies with local regulatory requirements.
A security analyst is evaluating the risks of authorizing multiple security solutions to collect data from the company’s cloud environment. Which of the following is an immediate consequence of these integrations?
A. Non-compliance with data sovereignty rules
B. Loss of the vendors interoperability support
C. Mandatory deployment of a SIEM solution
D. Increase in the attack surface
D. Increase in the attack surface
Which of the following explains why RTO is included in a BIA?
A. It identifies the amount of allowable downtime for an application or system.
B. It prioritizes risks so the organization can allocate resources appropriately.
C. It monetizes the loss of an asset and determines a break-even point for risk mitigation.
D. It informs the backup approach so that the organization can recover data to a known time.
A. It identifies the amount of allowable downtime for an application or system.
A security analyst is reviewing web-application logs and finds the following log:
https://www.comptia.org/contact-us/%3Ffile%3d..%2F..%2F..%2F..Fetc%2Fpasswd
Which of the following attacks is being observed?
A. Directory traversal
B. XSS
C. CSRF
D. On-path attack
A. Directory traversal
A security analyst is reviewing the vulnerability scan report for a web server following an incident. The vulnerability that was used to exploit the server is present in historical vulnerability scan reports, and a patch is available for the vulnerability. Which of the following is the MOST likely cause?
A. Security patches were uninstalled due to user impact.
B. An adversary altered the vulnerability scan reports
C. A zero-day vulnerability was used to exploit the web server
D. The scan reported a false negative for the vulnerability
A. Security patches were uninstalled due to user impact
Which of the following is a known security risk associated with data archives that contain financial information?
A. Data can become a liability if archived longer than required by regulatory guidance.
B. Data must be archived off-site to avoid breaches and meet business requirements.
C. Companies are prohibited from providing archived data to e-discovery requests.
D. Unencrypted archives should be preserved as long as possible and encrypted.
A. Data can become a liability if archived longer than required by regulatory guidance.
Which of the following BEST describes the process of documenting who has access to evidence?
A. Order of volatility
B. Chain of custody
C. Non-repudiation
D. Admissibility
B. Chain of custody
A systems engineer wants to leverage a cloud-based architecture with low latency between network-connected devices that also reduces the bandwidth that is required by performing analytics directly on the endpoints. Which of the following would BEST meet the requirements? (Choose two.)
A. Private cloud
B. SaaS
C. Hybrid cloud
D. IaaS
E. DRaaS
F. Fog computing
C. Hybrid cloud
F. Fog computing
Which of the following is a policy that provides a greater depth and breadth of knowledge across an organization?
A. Asset management policy
B. Separation of duties policy
C. Acceptable use policy
D. Job rotation policy
D. Job rotation policy
A company is moving its retail website to a public cloud provider. The company wants to tokenize credit card data but not allow the cloud provider to see the stored credit card information. Which of the following would BEST meet these objectives?
A. WAF
B. CASB
C. VPN
D. TLS
B. CASB
A security analyst is tasked with defining the “something you are” factor of the company’s MFA settings. Which of the following is BEST to use to complete the configuration?
A. Gait analysis
B. Vein
C. Soft token
D. HMAC-based, one-time password
B. Vein
Which of the following processes will eliminate data using a method that will allow the storage device to be reused after the process is complete?
A. Pulverizing
B. Overwriting
C. Shredding
D. Degaussing
B. Overwriting
A user’s account is constantly being locked out. Upon further review, a security analyst found the following in the SIEM:
9:00:00 AM Login: user Password: aBG23TMV
9:00:01 AM Login: user Password: aBG23TMV
9:00:02 AM Login: user Password: aBG23TMV
9:00:03 AM Login: user Password: aBG23TMV
Which of the following describes what is occurring?
A. An attacker is utilizing a password-spraying attack against the account.
B. An attacker is utilizing a dictionary attack against the account.
C. An attacker is utilizing a brute-force attack against the account.
D. An attacker is utilizing a rainbow table attack against the account.
C. An attacker is utilizing a brute-force attack against the account.
A web server has been compromised due to a ransomware attack. Further investigation reveals the ransomware has been in the server for the past 72 hours. The systems administrator needs to get the services back up as soon as possible. Which of the following should the administrator use to restore services to a secure state?
A. The last incremental backup that was conducted 72 hours ago
B. The last known-good configuration
C. The last full backup that was conducted seven days ago
D. The baseline OS configuration
C. The last full backup that was conducted seven days ago